summaryrefslogtreecommitdiff
blob: 9473bdac5d5292fc21edab476164551b6d491eb6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200411-10">
  <title>Gallery: Cross-site scripting vulnerability</title>
  <synopsis>
    Gallery is vulnerable to cross-site scripting attacks.
  </synopsis>
  <product type="ebuild">gallery</product>
  <announced>2004-11-06</announced>
  <revised count="02">2006-05-22</revised>
  <bug>69904</bug>
  <access>remote</access>
  <affected>
    <package name="www-apps/gallery" auto="yes" arch="*">
      <unaffected range="ge">1.4.4_p4</unaffected>
      <vulnerable range="lt">1.4.4_p4</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Gallery is a web application written in PHP which is used to organize
    and publish photo albums. It allows multiple users to build and
    maintain their own albums. It also supports the mirroring of images on
    other servers.
    </p>
  </background>
  <description>
    <p>
    Jim Paris has discovered a cross-site scripting vulnerability in
    Gallery.
    </p>
  </description>
  <impact type="low">
    <p>
    By sending a carefully crafted URL, an attacker can inject and execute
    script code in the victim's browser window, and potentially compromise
    the users gallery.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Gallery users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=www-apps/gallery-1.4.4_p4"</code>
  </resolution>
  <references>
    <uri link="http://gallery.menalto.com/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=142&amp;mode=thread&amp;order=0&amp;thold=0">Gallery Announcement</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1106">CVE-2004-1106</uri>
  </references>
  <metadata tag="submitter" timestamp="2004-11-05T01:49:40Z">
    lewk
  </metadata>
  <metadata tag="bugReady" timestamp="2004-11-06T09:24:41Z">
    koon
  </metadata>
</glsa>